The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Application of WinCC and S7-400 dual-redundancy PLC controllers in a dense-phase transporting control system is introduced in this paper. The production process and the overall structure of the system are described in detail.STEP7 programming tool is used to compile the control program. The key technology of program design is described. Design of the functions of the monitoring system is performed...
Business process risk management is an important part in E-Business. In this paper, with deep investigation to a Chinese international trade company, we research E-Business process risks and find relevant risk mitigation instruments, which will be discussed below. Result of this research will guide experts or practitioners in the field of B2B E-Business to manage process risks.
A technical scheme, which can properly arrange IDS and optimally apply the algorithms of detection and data mining to the Honeynet environment, is proposed in the building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected optimally. Meanwhile, the...
Object tracking is viewed as a two-class ldquoone-versus-restrdquo classification problem, in which the sample distribution of the target is approximately Gaussian while the background samples are often multi-modal. Based on these special properties, we model the visual appearance via graph approach, which is a semi-supervised approach. The topology structure of graph is carefully designed to reflect...
A new algorithm, which is based on partial support tree (PS_Tree), is proposed to deal with the incremental updating problem when a new database is inserted and the minimum support is not changed. This algorithm use effectively the association rules mined and the partial support tree reserved to improve the performance. It only need scan the updated part of the database once so that the efficiency...
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the algorithms of detection and data mining to the Honeynet environment based on a project of building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.